Abstract | ||
---|---|---|
JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form autonomous peer groups. This paper presents a method that provides security services to the core protocols: privacy, authenticity, integrity and non-repudiation. The presented mechanisms are fully distributed and based on a pure peer-to-peer model, not requiring the arbitration of a trusted third party or a previously established trust relationship between peers, which is one of the main challenges under this kind of environments. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/CISIS.2009.24 | CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2 |
Keywords | Field | DocType |
peer-to-peer, security, peer group, JXTA, xmldsig, xmlenc | Trusted third party,Peer-to-peer,Cryptographic protocol,Cryptography,Computer science,Computer network,Wireless ad hoc network,Ubiquitous computing,Distributed computing,XML Signature,Routing protocol | Conference |
Citations | PageRank | References |
2 | 0.37 | 5 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Joan Arnedo | 1 | 134 | 21.88 |
Jordi Herrera-Joancomartí | 2 | 411 | 182.00 |